09
Downloadable computer software for cybersecurity, detecting
and mitigating network attacks using artificial
intelligence, machine learning and/or deep learning;
downloadable computer software for continuous monitoring,
identifying, verifying, analyzing, comparing, classifying,
sorting and scoring of collected or acquired data from
network traffic, network communication, network flow data,
and network intercommunication using artificial
intelligence, machine learning and/or deep learning;
downloadable computer software for providing initiation,
distribution, delivery and response tracking of emergency
notifications to users via personal communication devices
and public mass communication devices; downloadable computer
software for supporting exchange of information and
collaboration processes amongst organizations and people
during emergency and crisis situations; downloadable
computer software for the purposes of data collection,
monitoring, and mass notification services for managing
emergency, and crisis and business critical situations and
improving crisis communications capability; downloadable
computer software for the secure transmission of mass
notification emergency information via audio, video and
electronic communications networks and devices, including
social networks; downloadable computer software for managing
and analyzing data feeds and data inputs in the field of
crisis reporting, communication and management, and for
sending notifications through multiple IP network channels
and delivery services; downloadable computer software for
loading data from personnel directories, and managing users
for purpose of crisis communication; downloadable computer
software for managing organization directories and
connections across organizations for the purpose of
connecting them and facilitating collaboration before,
during and after crisis situations; downloadable computer
software for locating personnel for security and safety
purposes using a global positioning system, user
self-reporting, and other locating means; downloadable
computer software for electronically monitoring, detecting
and reporting on alarms, alerts, emergencies, hazards,
security threats, and dangerous weather; downloadable
computer software for notifying individuals and
organizations of a changed status or condition of a sensing
device or input feed via network based message alerts;
downloadable software in the nature of a mobile application
for sending, receiving, confirming and responding to alerts,
messages, and notifications via wireless communications
networks or the Internet; downloadable computer software in
the nature of desktop software applications for providing
desktop notifications that capture the user's attention with
audio-visual signals and allow users to confirm, respond to
notifications or receive additional information related to
notifications; downloadable computer software for use in
threat prevention, detection, investigation, response,
remediation and analysis for computers, computer systems,
servers, computer networks, endpoints, mobile devices,
enterprise of things (EOT) and internet of things (IoT)
enabled devices; computer software for managing computer
network endpoint security and predicting and monitoring
security threats to computer networks; downloadable computer
operating system programs; downloadable computer software
for performing data security functions in the field of
cryptographic network security; downloadable computer
software for automating a process for authentication of
identity using existing databases in connection with the
issuance and management of digital certificates used for
authentication or encryption of digital communications over
the Internet and other computer networks; downloadable
computer software, namely, encryption software to enable
secure transmission of digital information; downloadable
computer software to integrate managed security, namely,
virtual private network (VPN), public key infrastructure
(PKI), digital certificate issuance, verification and
management; cloud computing software; downloadable Internet
of things (IOT) management software platform consisting of
downloadable cloud-based software, mobile and desktop
applications, and premise-based gateway agent software;
downloadable computer software for use in managing
device-to-device, device-to-cloud and cloud-to-device
communications; downloadable computer software for
machine-to-machine (M2M) communication, remote data
collection and process control; downloadable computer
software for asset tracking; downloadable computer software
to track and manage IP-enabled machines and other connected
devices; downloadable software Development Kits (SDKs),
Application Programming Interface (API) software, and
Enterprise Application Integration (EAI) software for
creating software and applications related to machine to
machine (M2M) devices, network and Internet connected
devices, and IOT devices; downloadable computer software for
sending, receiving and analyzing data from network and
Internet-connected devices; downloadable computer software,
namely, software and middleware used to allow software
applications to interface with mobile and remote devices and
to allow connectivity, memory storage, and device
management, all via a computer network; downloadable
computer software and hardware for fleet asset tracking in
the transportation industry; downloadable computer software
and hardware for tracking and managing IP-enabled machines;
downloadable computer software and hardware to collect,
filter and process electronic data, namely, audio, voice,
video, images, text, electronic mail and messaging,
documents, and vehicle and driver telematics and analytics
concerning driver behavior, vehicle diagnostics,
maintenance, performance, location, and downtime;
downloadable computer software systems for use in dispatch,
video monitoring, driver compliance, driver performance,
driver scorecards, document management, trailer tracking,
asset tracking, vehicle tracking, telematics, fuel economy
tracking, driver workflow, integrations with third party
software, vehicle utilization, temperature tracking, vehicle
inspection reports; mobile phones, smart phones, tablet
computers and wireless communication devices for voice,
data, or image transmission; accessories for mobile phones,
smart phones, tablet computers and wireless communication
devices, namely, headsets and earphones, phone chargers,
battery chargers, mounts, cradles and holders for hands-free
phone use, charging and docking stations, cell phone and
tablet computer protective cases, protective covers and
cases for handheld electronic devices, cell phone holsters,
and speakers; downloadable computer software for mobile
phones, portable media players, and handheld computers,
namely, software for sending digital photos, videos, images,
and text to others via the global computer network;
downloadable computer software in the fields of Mobile
Device Management (MDM), Mobile Applications Management
(MAM), Mobile Security Management (MSM), Mobile Information
Management (MIM), and mobile Identity and Access Management
(IAM); downloadable computer software to allow network
administrators to monitor, manage, and quarantine devices
that are granted access to a network
42
Providing temporary use of non-downloadable computer
software for measuring, assessing, identifying, detecting,
analyzing, preventing, and responding to cybersecurity
threats, attacks, risks, and vulnerabilities; providing
temporary use of non-downloadable software for artificial
intelligence, analytics-based machine learning, and deep
learning software, all for the purpose of measuring,
detecting, analyzing, preventing and responding to
cybersecurity attacks; Design and development of crisis
communication systems comprised of computer hardware and
software; engineering and systems analysis in the field of
crisis communication systems; computer services, namely,
providing online system management services that allow users
to remotely view, monitor, program, operate and control
crisis communication systems; research in the field of
crisis communication technology; testing of crisis
communication systems comprised of computer software and
hardware; cloud computing featuring software for providing
crisis communication through multiple IP network channels
and delivery services; computer services, namely,
integration of private and public cloud computing
environments for crisis communication; computer services,
namely, cloud hosting provider services for crisis
communication; computer services, namely, installation of
computer software for private cloud computing for crisis
communication; consulting services in the field of cloud
computing for crisis communication; computer services,
namely, creating an online community for registered users to
participate in discussions, get feedback from their peers,
form virtual communities, invite other organizations to the
community and engage collaboration in the field of security
and crisis communication and management; providing temporary
use of online non-downloadable software featuring software
for use in sending, receiving, confirming and responding to
alerts, messages, and notifications in the field of crisis
communication and management; providing temporary use of
online non-downloadable software, namely, hosting software
for use by others for use in sending, receiving, confirming
and responding to alerts, messages, and notifications in the
field of crisis communication and management; providing
online non-downloadable computer software for the purposes
of data collection, monitoring, and mass notification
services for managing emergency and crisis situations and
improving crisis communications capability; providing
temporary use of on-line non-downloadable computer software
for endpoint security, malware analysis, vulnerability
testing, penetration testing, and vulnerability assessment;
providing temporary use of online non-downloadable software
for use in threat prevention, detection, investigation,
response, remediation and analysis for computers, computer
systems, servers, computer networks, endpoints, mobile
devices, and internet of things (IoT) enabled devices;
providing temporary use of online non-downloadable software
for predicting and monitoring security threats to computer
networks; providing temporary use of online non-downloadable
software for preventing unauthorized access to computers and
computer networks; providing temporary use of online
non-downloadable software for data analytics; Design,
development and maintenance of online computer software
systems and software for operation and control of
autonomous-driving vehicles; providing temporary use of
online non-downloadable software for operation and control
of autonomous-driving vehicles; Providing temporary use of
non-downloadable software applications and software
development tools and platform as a services (PAAS)
featuring computer software platforms that enable software
developers to program and users to build and configure
software applications that work in conjunction with such
non-downloadable software applications and platforms to
transfer, share, format, manipulate and integrate data,
information and such developer software applications working
in conjunction with and between such non-downloadable
software applications and platforms and third party
services; providing temporary use of online non-downloadable
software featuring computer software in the field of
electronic file security to allow users to encrypt,
electronically watermark, provide restricted access to, and
provide secure transmission and tracking of electronic
documents and other electronic and digital files; platform
as a services (PAAS) featuring computer software platforms
for creating, managing, and deploying cloud computing
infrastructure services; Design and development of on-line
computer software systems, computer hardware and computer
software; Technical support services, namely, installation,
administration, and troubleshooting of web and database
applications; providing machine-to-machine (M2M) and
Internet of Things (IoT) communication integration services,
namely, the integration of disparate computer systems,
networks, hardware and software through the application of
wireless communication, artificial intelligence, machine
learning and/or deep learning technology to facilitate M2M
and IoT communication via web based browsers, personal
digital assistants, mobile phones, embedded microprocessors,
sensors and other electronic devices; providing temporary
use of online non-downloadable software applications,
software developer kits (SDKs) and software development
tools, and platform as a service (PAAS) featuring computer
development platforms that enable software developers to
design, test, deploy, manage, and monitor internet of things
(IoT) and machine-to-machine (m2m) devices; computer
software services, namely, development, maintenance, repair,
installation, and troubleshooting of computer software
problems, support in the nature of diagnosing computer
software problems, upgrade and updating computer software,
authoring computer software, provision of computer software
information, and consultation, design and customization of
computer software and middleware; computer security
consultancy; technical consulting and assistance with
computer-based information systems and components, namely,
technical consulting services in the fields of Mobile Device
Management (MDM), Mobile Applications Management (MAM),
Mobile Security Management (MSM), Mobile Information
Management (MIM), mobile Identity and Access Management
(IAM), datacenter architecture, public and private cloud
computing solutions, cybersecurity, and evaluation and
implementation of internet technology and services;
providing a secure website in the nature of a web hosting
platform for, and providing temporary use of on-line
non-downloadable software for allowing users and enterprise
software applications to interface with remote devices and
to allow connectivity, memory storage, device management,
device monitoring, device tracking, and device auditing, all
via a computer network (term considered too vague by the
International Bureau - Rule 13 (2) (b) of the Regulations);
providing temporary use of online non-downloadable software
featuring software for Enterprise Mobility Management (EMM),
Unified Endpoint Management (UEM), Mobile Device Management
(MDM), Mobile Applications Management (MAM), Mobile Security
Management (MSM), Mobile Information Management (MIM), and
mobile Identity and Access Management (IAM); providing
temporary use of online non-downloadable software for the
operation, management, security and maintenance of
enterprise networks, data center management, resource
management and performance optimization
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen